Cyber
Law is the law governing cyberspace. Cyberspace is a very wide term and
includes computers, networks, software, data storage devices (such as
hard disks, USB disks etc), the Internet, websites, emails and even
electronic devices such as cell phones, ATM machines etc.
Law encompasses the rules of conduct:
1. that have been approved by the government, and
2. which are in force over a certain territory, and
3. which must be obeyed by all persons on that territory.
Violation of these rules could lead to government action such as imprisonment or fine or an order to pay compensation.
Cyber law encompasses laws relating to:
1. Cyber Crimes
2. Electronic and Digital Signatures
3. Intellectual Property
4. Data Protection and Privacy
Cyber
crimes are unlawful acts where the computer is used either as a tool or
a target or both. The enormous growth in electronic commerce
(ecommerce) and online share trading has led to a phenomenal spurt in
incidents of cyber crime. These crimes are discussed in detail further
in this chapter. A comprehensive discussion on the Indian law relating
to cyber crimes and digital evidence is provided in the ASCL publication
titled “Cyber Crimes & Digital Evidence – Indian Perspective”.
Electronic
signatures are used to authenticate electronic records. Digital
signatures are one type of electronic signature. Digital signatures
satisfy three major legal requirements – signer authentication, message
authentication and message integrity. The technology and efficiency of
digital signatures makes them more trustworthy than hand written
signatures. These issues are
discussed in detail in the ASCL publication titled “Ecommerce – Legal Issues”.
Intellectual
property is refers to creations of the human mind e.g. a story, a song,
a painting, a design etc. The facets of intellectual property that
relate to cyber space are covered by cyber law.
These include:
• copyright law in relation to computer software, computer source code, websites, cell phone content etc,
• software and source code licences
• semiconductor law which relates to the protection of semiconductor integrated circuits design and layouts,
• patent law in relation to computer hardware and software.
These issues are discussed in detail in the ASCL publication titled “IPR & Cyberspace - the Indian Perspective”.
Data
protection and privacy laws aim to achieve a fair balance between the
privacy rights of the individual and the interests of data controllers
such as banks, hospitals, email service providers
etc.
These laws seek to address the challenges to privacy caused by
collecting, storing and transmitting data using new technologies.
Need for Cyber Law
There
are various reasons why it is extremely difficult for conventional law
to cope with cyberspace. Some of these are discussed below.
1. Cyberspace is an intangible dimension that is impossible to govern and regulate using conventional law.
2.
Cyberspace has complete disrespect for jurisdictional boundaries. A
person in India could break into a bank’s electronic vault hosted on a
computer in USA and transfer millions of Rupees to another bank in
Switzerland, all within minutes. All he would need is a laptop computer
and a cell phone.
3.
Cyberspace handles gigantic traffic volumes every second. Billions of
emails are crisscrossing the globe even as we read this, millions of
websites are being accessed every minute and billions of dollars are
electronically transferred around the world by banks every day.
4.
Cyberspace is absolutely open to participation by all. A ten year- old
in Bhutan can have a live chat session with an eight year- old in Bali
without any regard for the distance or the anonymity between them.
5.
Cyberspace offers enormous potential for anonymity to its members.
Readily available encryption software and steganographic tools that
seamlessly hide information within image and sound files ensure the
confidentiality of information exchanged between cyber-citizens.
6.
Cyberspace offers never-seen-before economic efficiency. Billions of
dollars worth of software can be traded over the Internet without the
need for any government licenses, shipping and handling charges and
without paying any customs duty.
7.
Electronic information has become the main object of cyber crime. It is
characterized by extreme mobility, which exceeds by far the mobility of
persons, goods or other services. International computer networks can
transfer huge amounts of data around the globe in a matter of seconds.
8. A software source code worth crores of rupees or a movie can be pirated across the globe within hours of their release.
9. Theft of corporeal information (e.g. books, papers, CD ROMs, floppy disks) is easily covered by traditional penal provisions.
However,
the problem begins when electronic records are copied quickly,
inconspicuously and often via telecommunication facilities. Here the
“original” information, so to say, remains in the
“possession” of the “owner” and yet information gets stolen.
Cyber Laws in India
In
May 2000, both the houses of the Indian Parliament passed the
Information Technology Bill. The Bill received the assent of the
President in August 2000 and came to be known as the Information
Technology Act, 2000. Cyber laws are contained in the IT Act, 2000.
This
Act aims to provide the legal infrastructure for e-commerce in India.
And the cyber laws have a major impact for e-businesses and the new
economy in India. So, it is important to understand what are the various
perspectives of the IT Act, 2000 and what it offers.
The
Information Technology Act, 2000 also aims to provide for the legal
framework so that legal sanctity is accorded to all electronic records
and other activities carried out by electronic means. The Act states
that unless otherwise agreed, an acceptance of contract may be expressed
by electronic means of communication and the same shall have legal
validity and enforceability. Some highlights of the Act are listed
below:
- Chapter-II of the Act specifically stipulates that any subscriber may authenticate an electronic record by affixing his digital signature. It further states that any person can verify an electronic record by use of a public key of the subscriber.
- Chapter-III of the Act details about Electronic Governance and provides inter alia amongst others that where any law provides that information or any other matter shall be in writing or in the typewritten or printed form, then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied if such information or matter is
- rendered or made available in an electronic form; and
- accessible so as to be usable for a subsequent reference
The said chapter also details the legal recognition of Digital Signatures.
- Chapter-IV of the said Act gives a scheme for Regulation of Certifying Authorities. The Act envisages a Controller of Certifying Authorities who shall perform the function of exercising supervision over the activities of the Certifying Authorities as also laying down standards and conditions governing the Certifying Authorities as also specifying the various forms and content of Digital Signature Certificates. The Act recognizes the need for recognizing foreign Certifying Authorities and it further details the various provisions for the issue of license to issue Digital Signature Certificates.
- Chapter-VII of the Act details about the scheme of things relating to Digital Signature Certificates. The duties of subscribers are also enshrined in the said Act.
- Chapter-IX of the said Act talks about penalties and adjudication for various offences. The penalties for damage to computer, computer systems etc. has been fixed as damages by way of compensation not exceeding Rs. 1,00,00,000 to affected persons. The Act talks of appointment of any officers not below the rank of a Director to the Government of India or an equivalent officer of state government as an Adjudicating Officer who shall adjudicate whether any person has made a contravention of any of the provisions of the said Act or rules framed there under. The said Adjudicating Officer has been given the powers of a Civil Court.
- Chapter-X of the Act talks of the establishment of the Cyber Regulations Appellate Tribunal, which shall be an appellate body where appeals against the orders passed by the Adjudicating Officers, shall be preferred.
- Chapter-XI of the Act talks about various offenses and the said offenses shall be investigated only by a Police Officer not below the rank of the Deputy Superintendent of Police. These offences include tampering with computer source documents, publishing of information, which is obscene in electronic form, and hacking.
- The Act also provides for the constitution of the Cyber Regulations Advisory Committee, which shall advise the government as regards any rules, or for any other purpose connected with the said act. The said Act also proposes to amend the Indian Penal Code, 1860, the Indian Evidence Act, 1872, The Bankers' Books Evidence Act, 1891, The Reserve Bank of India Act, 1934 to make them in tune with the provisions of the IT Act.
No comments:
Post a Comment